Online banking creates great efficiencies. But the greatest vulnerabilities in electronic banking tend to occur within banking client systems — and often can be countered through simple steps. Some of our top tips follow.Download the article (PDF)

According to a new report, "The Top Cyber Security Risks", jointly issued by security vendors TippingPoint and Qualys, as well as the Internet Storm Center and SANS Institute, more than half of current cyber attacks against businesses and government agencies are focused on two common vulnerabilities.

Knowledge-based authentication — using personal information from databases instead of predetermined security questions — is supposed to be more resistant to phishing. In response, fraudsters have turned their phishing efforts to the databases themselves. Unlike the security questions users choo...

The use of the Automated Clearing House (ACH) payments is an excellent model for effective, efficient and low cost disbursements and collections. ACH adoption continues to grow as an increasing number of companies find more ways to incorporate the use of these payments into their cash flows.
The overwhelming use remains direct deposit of payroll, although with the growing acceptance of bill pay services and the convergence of check with ACH, companies are finding that they are the recipients of ACH collections in greater numbers than ever before. ACH serves as an effective disbursement tool for employee reimbursements, vendor payments, tax payments and child support.
On the collection side, automatic debit programs with customers for payment of subscriptions, dues and memberships have long been shown to be efficient and highly cost-effective.